access2-login.com
Open in
urlscan Pro
159.223.124.221
Malicious Activity!
Public Scan
Effective URL: http://access2-login.com/login.php?online_id=e4d8741afafbe4c3fcba71ebblogin_id=94d26054b41206ebd81b7af3cfcd8da094d26054b4...
Submission Tags: @ecarlesi possiblethreat Search All
Submission: On December 01 via api from IT — Scanned from IT
Summary
This is the only time access2-login.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 159.223.124.221 159.223.124.221 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
9 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
access2-login.com
1 redirects
access2-login.com |
576 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | access2-login.com |
1 redirects
access2-login.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://access2-login.com/login.php?online_id=e4d8741afafbe4c3fcba71ebblogin_id=94d26054b41206ebd81b7af3cfcd8da094d26054b41206ebd81b7af3cfcd8da0&session=94d26054b41206ebd81b7af3cfcd8da094d26054b41206ebd81b7af3cfcd8da0
Frame ID: 01F60C9F8262F1E3963BD3D8921D3E9D
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Bank of America | Log InPage URL History Show full URLs
-
http://access2-login.com/
HTTP 302
http://access2-login.com/login.php?online_id=e4d8741afafbe4c3fcba71ebblogin_id=94d26054b41206ebd81b7a... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://access2-login.com/
HTTP 302
http://access2-login.com/login.php?online_id=e4d8741afafbe4c3fcba71ebblogin_id=94d26054b41206ebd81b7af3cfcd8da094d26054b41206ebd81b7af3cfcd8da0&session=94d26054b41206ebd81b7af3cfcd8da094d26054b41206ebd81b7af3cfcd8da0 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
access2-login.com/ Redirect Chain
|
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v4-jawr.css
access2-login.com/bstyles/ |
445 KB 445 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BofA_rgb.png
access2-login.com/bstyles/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v4-jawr-print.css
access2-login.com/bstyles/ |
10 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile_llama.png
access2-login.com/bstyles/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
access2-login.com/bstyles/ |
473 B 780 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-sprite.png
access2-login.com/bstyles/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb-static-sprite.png
access2-login.com/bstyles/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home-icon.png
access2-login.com/bstyles/ |
144 B 451 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| validateForm1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
access2-login.com/ | Name: PHPSESSID Value: b83741b954e19c00fdf73ba855e9f26f |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
access2-login.com
159.223.124.221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